共 50 条
- [2] RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 79 - +
- [3] VeryIDX - A Digital Identity Management System for Pervasive Computing Environments [J]. SOFTWARE TECHNOLOGIES FOR EMBEDDED AND UBIQUITOUS SYSTEMS, PROCEEDINGS, 2008, 5287 : 268 - +
- [5] Expose or not? A progressive exposure approach for service discovery in pervasive computing environments [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 225 - 234
- [6] Coordination in pervasive computing environments [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 3 - 9
- [7] On Modeling for Pervasive Computing Environments [J]. MSWIM'07: PROCEEDINGS OF THE TENTH ACM SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS, 2007, : 240 - 243
- [8] Identity-Based Inter-domain Authentication Scheme in Pervasive Computing Environments [J]. INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT II, 2011, 135 : 314 - 320
- [9] Protection of privacy in pervasive computing environments [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 242 - 247
- [10] Pervasive Computing in Classroom Environments and Applications [J]. 2014 GLOBAL SUMMIT ON COMPUTER & INFORMATION TECHNOLOGY (GSCIT), 2014,